EP1060607A1 - Procede et dispositif d'acces universel et protege a des reseaux telephoniques - Google Patents

Procede et dispositif d'acces universel et protege a des reseaux telephoniques

Info

Publication number
EP1060607A1
EP1060607A1 EP99908839A EP99908839A EP1060607A1 EP 1060607 A1 EP1060607 A1 EP 1060607A1 EP 99908839 A EP99908839 A EP 99908839A EP 99908839 A EP99908839 A EP 99908839A EP 1060607 A1 EP1060607 A1 EP 1060607A1
Authority
EP
European Patent Office
Prior art keywords
identification
subscriber
features
central computer
biometric
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP99908839A
Other languages
German (de)
English (en)
Inventor
Uwe Korst
Clemens Wanko
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Deutsche Telekom AG
Original Assignee
Deutsche Telekom AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Deutsche Telekom AG filed Critical Deutsche Telekom AG
Publication of EP1060607A1 publication Critical patent/EP1060607A1/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/257Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/38Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
    • H04M3/382Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections using authorisation codes or passwords

Definitions

  • the invention relates to a method and a device for universal and secure access to telephone networks with mobile accessibility of the user, in particular to telephone networks according to the preamble of claim 1 for the method and claim 6 for the device.
  • Switching technology facilities that can be reached by a user via toll-free numbers are generally known today. After successful selection of the switching technology facility, the user must identify himself to the switching technology facility. This is usually done by entering an identification number, for example via the keypad of a telephone, using the tone dialing method or by voice input. Certain features or an existing credit in a certain currency or certain telephone units can be assigned to the identification numbers. The user can then call up the features or the credit after successful identification.
  • An essential feature of this method is that no special terminal is required (tone dialing / voice input is sufficient) and there are no costs on site by dialing in via a toll-free number.
  • the identification feature can have a "paid” or “still to be paid” character, the identification can be linked to either a specific fixed credit or an open billing procedure comparable to that of a normal telephone connection. Furthermore, special individual performance features can be linked to each individual identification. - 2 -
  • calling card systems are usually based on a central control unit with a corresponding database or a central computer.
  • VCC Virtual Calling Card
  • PIN Personal Identification Number
  • Authentication is carried out in a security module installed in the terminal.
  • the security module receives the chip data and, based on a system key, calculates an individual card key located in the memory chip card.
  • a method for checking memory chip cards is known from DE 196 04 349 AI, which enables two or more authentication using cryptographic functions and using a terminal.
  • the disadvantage of these described methods and systems is that they require the user to provide an identification feature, for example a card number. For security reasons - 3 -
  • this card number should be as many digits as possible.
  • the user can specify the ID feature in relation to a machine or an intermediate operator.
  • this procedure is lengthy and complicated in comparison with the usual telephony.
  • the cumbersome handling keeps many potential users from intensive use of so-called calling card systems.
  • the invention is therefore based on the object of providing a method and a device for universal and secure access to networks, in particular to the telephone network, in which the subscribers identify themselves to a system and the individual usage profile is checked and, after correct identification of the subscribers, access to the System and thus to the desired service, the billing is assigned to the identification, the identification is to be carried out on a mobile basis and / or biometric identifications are used.
  • biometric identifications are generally known for security systems of all kinds, the application has - A -
  • This identification above all has the advantage that biometric features can be stored on chip cards and that after the identification has been entered, a profile evaluation can also be carried out in the central computer. A check is carried out, for example, as to whether it is plausible that the participant can be at the respective input device at all. If a usage took place a few hours earlier from a remote location, then the participant is very likely not authentic. Furthermore, the method and the device according to the invention can be used to check against a usage profile as part of the identification check, that is to say how often, when, from which location, with what turnover and which usage properties are used, for example. This makes CallingCard systems easier and safer to use. The response times to identified security problems are considerably shorter compared to the previous method and the assignment of performance features for identification can now be carried out in the central computer or in a central control unit of the switching equipment.
  • Fig. 1 is a schematic diagram for explaining the method according to the invention
  • 3a shows a basic diagram for a
  • Fig. 3b is a diagram showing the stay of a
  • 3c shows a diagram for the services used by customers.
  • Terminal 1 shows two terminals 2 and 3, which have a reading device for identifying a subscriber. These terminals 2 and 3 are each used by a mobile data carrier 1 for identification with the system, in particular the calling card system.
  • the biometric identifications shown in principle below, for example can also be carried out, for example with the aid of iris recognition, with the aid of fingerprint recognition or with the aid of special speech features.
  • Terminal 2 is connected to the calling card system in the present example via a dial-up network 4. In the present example, this consists of a central computer 6 which is connected to a database 7 and a unit for identification 8. In the calling card system, the identification is checked and the performance features are assigned for identification. After the participant has been correctly identified, they will be given access to the - 6 -
  • a mobile data carrier 1 is used in this method as identification, which automatically sends the identification to a specially equipped terminal 2 or 3.
  • a biometric feature or two biometric features or more are transmitted as identification for the purpose of greater security. After checking the identification in the unit for identification check 8, the performance features are assigned to the respective identification.
  • Identification can be increased in the security standard, for example, by additional secret information, for example a personal identification number. Above all, it is also interesting to combine the biometric identification features, for example the iris, the fingerprint and / or the language features for subscriber identification. This significantly increases the security standard without complicating the test procedures.
  • the biometric identification in the form of iris, fingerprint and / or language features can above all be stored in addition to the existing security identifications, such as a personal identification number.
  • FIG. 2 again shows a basic illustration of a system for carrying out the method. It in turn consists of a dial-up network 4 or a direct connection 5 with an identifier 9 in on one side - 7th
  • the identifier 9 can again identify itself with the help of a mobile data carrier by means of biometric identification features.
  • Type testing of the identification of the biometric features can be done by storing the properties on the chip card.
  • a profile evaluation is first carried out in the central computer 6. For example, it is checked whether it is plausible that the subscriber can be at the terminal at all.
  • a user profile is stored in the unit for the identification check 8, for example, which indicates the location and the day on which a particular subscriber or the identifier 9 was or is located. Such a diagram is shown in Fig. 3b.
  • 3a shows the usage behavior of an identifier 9 as an example, in which, for example, the sales made are shown on one day or on several days. This profile is then also saved in the unit for the identification check and is updated again and again. Furthermore, as part of the identification check, a check is made against a usage profile shown in FIG. 3c, that is to say how often, when, from which location, with which turnover which usage properties are used. For this purpose, the customers C1 to C3 are shown in the diagram on the vertical and the services DLa to DLd used on the horizontal. - 8th -

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Telephone Function (AREA)

Abstract

L'invention concerne un procédé et un dispositif d'accès universel et protégé à des réseaux, notamment des réseaux téléphoniques à système de carte d'appel où les abonnés doivent être identifiés par ledit système. Si l'identification est correcte, l'abonné reçoit l'autorisation d'accéder au système. L'abonné bénéficie ensuite du service voulu, la taxation étant adjointe à l'identification. Pour la procédure d'identification, il est prévu un support de données (1) qui envoie l'identification sous forme de signe distinctif biométrique sur un terminal (2,3) équipé spécialement à cet effet, automatiquement par l'intermédiaire d'un réseau commuté, d'un réseau mobile ou d'un réseau fixe, à un ordinateur central (6) comportant une unité de vérification d'identification (8). Lorsque les signes distinctifs sont mémorisés sur un support de données (1) mobile, il est ensuite prévu pour renforcer la sécurité, une évaluation de profil dans l'ordinateur central (6) ou dans l'unité de vérification d'identification (8). A cet effet, il intervient par exemple une vérification de plausibilité qui consiste à vérifier si la personne identifiée peut toutefois rester sur un terminal (2,3) déterminé. Si quelques heures auparavant il y a eu utilisation depuis un endroit éloigné, la probabilité que l'abonné ne soit pas authentique est élevée. En cas de vérification positive d'identification, des caractéristiques d'exploitation sont automatiquement attribuées à l'abonné. Lesdites caractéristiques d'exploitation sont par exemple mémorisées dans une banque de données (7) reliée à l'ordinateur central (6).
EP99908839A 1998-03-04 1999-02-03 Procede et dispositif d'acces universel et protege a des reseaux telephoniques Withdrawn EP1060607A1 (fr)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE19809043A DE19809043A1 (de) 1998-03-04 1998-03-04 Verfahren und Vorrichtung zum universellen und gesicherten Zugang zu Telefonnetzen
DE19809043 1998-03-04
PCT/EP1999/000709 WO1999045690A1 (fr) 1998-03-04 1999-02-03 Procede et dispositif d'acces universel et protege a des reseaux telephoniques

Publications (1)

Publication Number Publication Date
EP1060607A1 true EP1060607A1 (fr) 2000-12-20

Family

ID=7859562

Family Applications (1)

Application Number Title Priority Date Filing Date
EP99908839A Withdrawn EP1060607A1 (fr) 1998-03-04 1999-02-03 Procede et dispositif d'acces universel et protege a des reseaux telephoniques

Country Status (3)

Country Link
EP (1) EP1060607A1 (fr)
DE (1) DE19809043A1 (fr)
WO (1) WO1999045690A1 (fr)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10000973A1 (de) 2000-01-06 2001-07-12 Deutsche Telekom Ag Verfahren zur sprachgesteuerten Identifizierung des Nutzers eines Telekommunikationsanschlusses im Telekommunikationsnetz beim Dialog mit einem sprachgesteuerten Dialogsystem
GB2363237A (en) * 2000-06-10 2001-12-12 Secr Defence Integrated security system
DE10043447A1 (de) * 2000-09-04 2002-03-28 Bioid Ag Verfahren und System zur Freischaltung eines mobilen Endgerätes
DE10054633C2 (de) * 2000-10-13 2003-05-22 Christian Hogl Verfahren und System zum Kontrollieren des Zugangs zu Waren und Dienstleistungen
DE10064040A1 (de) * 2000-12-21 2002-07-18 Tenovis Gmbh & Co Kg Rechnergesteuertes Vermittlungssystem mit Leistungsmerkmalen und Verfahren zur Steuerung und Nutzung von Leistungsmerkmalen
EP1235189A1 (fr) * 2001-02-26 2002-08-28 Keyware Technologies Capteur biométrique
DE102004014416A1 (de) * 2004-03-18 2005-10-06 Deutsche Telekom Ag Verfahren und System zur Personen/Sprecherverifikation über Kommunikationssysteme
DE102005003208B4 (de) * 2005-01-24 2015-11-12 Giesecke & Devrient Gmbh Authentisierung eines Benutzers
DE102007054474A1 (de) * 2007-11-13 2009-05-28 Vodafone Holding Gmbh Verfahren und System zur Kommunikation mit einem Mobilfunknetz

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4899373A (en) * 1986-11-28 1990-02-06 American Telephone And Telegraph Company At&T Bell Laboratories Method and apparatus for providing personalized telephone subscriber features at remote locations
US5345595A (en) * 1992-11-12 1994-09-06 Coral Systems, Inc. Apparatus and method for detecting fraudulent telecommunication activity
US5583933A (en) * 1994-08-05 1996-12-10 Mark; Andrew R. Method and apparatus for the secure communication of data

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO9945690A1 *

Also Published As

Publication number Publication date
DE19809043A1 (de) 1999-09-09
WO1999045690A1 (fr) 1999-09-10

Similar Documents

Publication Publication Date Title
DE69926977T2 (de) Anruferidentifizierungsauthentisierung und Leitweglenkung als Antwort hierauf
DE60121135T2 (de) Dienstaktiverung mittels einer virtuellen vorausbezahlten karte
EP1240631A1 (fr) Procede et systeme de transaction de paiement
EP2174281A2 (fr) Carte prépayée ou de crédit virtuelle et procédé ainsi que système de fourniture de celle-ci et de gestion de paiement électronique
EP0805607B1 (fr) Méthode d'accès d'au moins une partie des données d'une carte à microprocesseur
EP1306789A2 (fr) Serveur pour bloquer des cartes bancaires
EP1060607A1 (fr) Procede et dispositif d'acces universel et protege a des reseaux telephoniques
DE19609232A1 (de) Verfahren und Vorrichtung zum universellen und gesicherten Zugang zu angebotenen Multimediadiensten über das Telefonnetz
WO2005117404A1 (fr) Procede d'autorisation d'une transaction telephonique et noeud de commutation
WO2000039758A1 (fr) Procede de manipulation fiable de monnaie ou d'unites de valeurs avec des supports de donnees prepayes
EP1860595B1 (fr) Carte à puce dotée dýau moins deux identités
DE4441413C2 (de) Datenaustauschsystem
DE60026316T2 (de) System und verfahren zur bearbeitung von fernsprechanrufen
DE4231937C1 (de) Verfahren zum Feststellen der Identität des Inhabers einer Chipkarte, inbesondere Kreditkarte
EP0935870B1 (fr) Systeme d'authentification d'un reseau de communication
DE4406590C2 (de) System zur Authentifizierung von Anrufern
WO2007036341A1 (fr) Deblocage de cartes de telephonie mobile
EP0935869B1 (fr) Procede pour rendre toute eventuelle utilisation frauduleuse difficile dans des services de telecommunications
DE102005003208A1 (de) Authentisierung eines Benutzers
DE60221749T2 (de) Eröffnen einer Subscription in einem Mobilfunksystem
EP3629542B1 (fr) Délivrer des données confidentielles au moyen d'un téléphone fixe
EP1414259A1 (fr) Procédé pour détecter un module d'identification doublé
EP1370107B1 (fr) Méthode et appareil pour accéder à des données de portabilité de numéros
EP1115242B1 (fr) Authentification d'un abonné d'un service de télécommunication à l'aide d'une adresse souvent composée
EP0818760B1 (fr) Méthode pour empêcher l'abus de modules

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20001004

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

17Q First examination report despatched

Effective date: 20020809

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20021220